home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 2, Issue #2.06 (October 6, 1990) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith
- USENET readers can currently receive CuD as alt.society.cu-digest.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. It is assumed that non-personal mail to the moderators may be
- reprinted, unless otherwise specified. Readers are encouraged to submit
- reasoned articles relating to the Computer Underground.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: MARS BBS Sting a Prank
- File 4: Another view of hacking
- File 5: The CU in the news
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #2.06, File 1 of 5: Moderator's corner ***
- ********************************************************************
-
- From: Moderators
- Subject: Moderators' Corner
- Date: October 6, 1990
-
- ++++++++++
- In this file:
- 1. CuD SURVEY
- 2. NATIONAL COMPUTER SECURITY CONFERENCE
- 3. CORRECTION / ATI
-
- +++++++++++++++
- CuD Survey
- +++++++++++++++
-
- We thank everybody who filled out the CuD survey and thanks to Pat Townson for
- printing it in Telecom Digest. The response was far, far better than expected,
- and Bob Krause will have the results as soon as he tabulates them. Because of
- the volume, it may take a few weeks. Names and all identifying references are,
- of course, removed.
-
- +++++++++++++++++
- Computer Security Conference
- +++++++++++++++++
-
- Coming Next Issue: An eyewitness report on the National Computer Security
- Conference held last week in Washington, D.C. CuD's coverage will be
- limited to a single article unless someone else contributes! If you attended
- the NCSC (and we know many of you did!) why not jot down a few
- thoughts/observations and send them in? Alternate views, reviews,
- comments, and summaries are all welcome.
-
- ++++++++++++++
- Correction on ATI
- ++++++++++++++
-
- Gremlins in the keyboard mistyped---ATI stands for
- ACTIVIST TIMES, INC., (*NOT* "Anarchist")--
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Various Contributors
- Subject: From the Mailbag
- Date: October 4, 1990
-
- ********************************************************************
- *** CuD #2.06: File 2 of 5: From the Mailbag ***
- ********************************************************************
-
- From: peter@FICC.FERRANTI.COM(peter da silva)
-
- Regarding "what to do when you talk to LE agents":
-
- Most of these guidelines are important when talking to reporters, too. One
- would expect the press to be the underground's natural allies: the First
- Amendment should always be near and dear to their hearts. In practice,
- however, they have often taken action that seems designed to encourage
- authorities to curb free speech. Also, one of the recurring themes in
- articles posted by victimes of witchhunts is the effect of unfavorable
- publicity on people's lives. There was such an account in this very
- issue! So watch your tongue. Remember, if the press believe you're a
- bad guy they'll say anything to get you to make a "publishable"
- statement.
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: Mike Jezierski
-
- Law Enforcement and Computers:
-
- Not many law enforcement officials KNOW about computers. They see a computer
- as a way to check on a license plate or NCIC (we all know what that is)
-
- Refusing to answer questions gets on the bad side of a law enforcement
- officer, and sometimes he/she WILL use force against you (Indianapolis
- is a prime example of violent force against criminals)
-
- Saying "I want my lawyer" will do nothing but enrage your typical cop/agent
- and there is the possiblity that they would say "F*** your lawyer, I want
- answers NOW!!!" then proceed to beat the holy snot out of you...
-
- To the police, a criminal is a criminal...no matter is you're a murderer, a
- rapist, a thief or even a hacker.
-
- Of course you *could* bring brutality charges... so then the agent/cop lies
- and gets out of it ... big deal. Like the alleged thief described in
- C-u-D 2.05, you might be innocent but their being there makes you guilty.
-
- Enough Said...
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: The Butler
-
- Comment on Operation Sun Devil
-
- One of the reasons SS agents confiscated various BBS systems was because of
- the so called "ILLEGAL" information contained on them. It doesn't matter
- that most if not all of the "ILLEGAL" information can be found in a local
- Library, the SS still claimed it should not be posted on Electronic
- Bulletin Boards.
-
- Well the other day as I was thumbing through the latest issue of Computer
- Shopper I stumbled across an ad for, Guess what??? "TOP SECRET MANUALS"
- among them being: Computer Phreaking, Beyond Van Eck Phreaking, Automatic
- Teller Machines, Phone Color Boxes, Voice Mail Hacking, etc, etc.
-
- I suppose this is ok because it is in printed form. Same information but
- different form, is there a difference? Not to me!!!
-
- The Butler
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Jim Thomas
- Subject: MARS BBS Sting a Prank
- Date: 5 October, 1990
-
- ********************************************************************
- *** CuD #2.06: File 3 of 5: MARS BBS STING A PRANK ***
- ********************************************************************
-
- Ok, boys and girls, we've been had--the rumor of alleged Secret Service
- involvement in the MARS BBS at Mississippi State was a bit of a prank. It
- was not malicious, not intended to be deceptive, and not without a few
- lessons.
-
- For those who have read the post from Ed Luke, the sysop of MARS, a BBS
- accessible via ftp, the gist of the story was that the Secret Service had
- busted the board, but allowed it to return as a sting board. According to
- the post (reproduced at the end of this file), the names and the
- up/downloads of allegedly "obscene" .gif and .gl files were kept and turned
- over to the SS. The post circulated across the nets during the past week,
- and most of us were concerned about the implications of the story, if true.
- We tried calling Ed during the week, but couldn't reach him (he was not
- hiding--he was studying for seven hour exam), which delayed explanation of
- the prank. Some might be angry at the prank for the consternation it
- created among a lot of people. Was it tacky, in bad taste and outrageous?
- Of course it was. But, in context, it was also rather funny (for those of
- us who prefer Emo Phillips' view of the world to Kant's moral imperative).
- Here's the story as Ed relates it:
-
- MARS BBS began at Mississippi State on a university computer system. Ed
- had been asked to work on a BBS program for a friend, and he set it up as a
- demo board called "Resource Pirates Bulletin Board." The name was intended
- as a campy take-off on pirate boards, because they were "pirating" the
- nets, not software. Ed was explicit in re-affirming that, whatever his own
- personal views of proprietary information (he favors "knowledge to the
- people"), he takes his administrative obligations very seriously, and
- respects the laws restricting what can and cannot be placed on a university
- board (see related story on censorship in the next issue). The original
- software could accommodate about 50 users, and was quite small. It was a "no
- rules" board, but it became quite popular, something he had not
- anticipated. He made arrangements to obtain a legitimate board through the
- university on a legitimate machine and reworked the software.
-
- "I had no idea what I was getting when I started," Ed said in explaining
- that he was surprised at the number of users (currently over 1,400) and the
- amount of work involved in keeping up with the volume of traffic and the
- file transfers. The board was down for awhile when it was switched from an
- Athena to a MARS system. Numerous .gif (graphic pictures) and .gl (animated
- pictures) were uploaded, many of which were sexually explicit. His
- position was not to monitor or censor, even if the sheer volume of files
- would allow him time to do so: "How do I determine what's obscene? It
- becomes my responsibility to make that judgement call on everything. And I
- don't want to make that call," he explained. The gif collection grew, and
- they dominated communications on the board and ftp traffic.
-
- Although Ed doesn't know how the National Science Foundation (NSF) became
- aware of the files, there were complaints and threats by the NSF of
- curtailing access to the nets, because the NSF provide some of the net
- backbone. It was not a fight that Ed felt he could win, or one that he felt
- he could make a strong case for, so he removed the files. That's when the
- fun began.
-
- He began receiving a number of messages, and some of the "ridiculous" ones
- prompted the prank. He received numerous notes and complaints, and there
- was what he describes as "lots of paranoia" about why they were taken down.
- From mail we received at CuD, Ed's observations are accurate, because some
- MARS users suspected that the temporary hiatus during the change in systems
- was the result of a bust. In response to some of the more strident and
- conspiratorial messages he received, Ed wrote the following post:
-
- ******START POST**********
-
- Posted By: lush (Ed Luke)
- Date: Sat Sep 29 21:54:03 1990
- Title: The story about the GIF files.
-
- Ok, since everyone has been asking about the gif files, here's the story of
- what happened with the gifs... It seems that the secret service under
- direction of Pres. Bush is on a campaign against computer crime. You've
- read about some of this probably. It's called Operation Sun Devil. Some
- of the older users will remember when this bbs was called the Pirates
- Resource BBS and was on athena.ee.mssate.edu. Well we eventually got shut
- down in a fashion similar to that of the victims of operation sun devil.
- However, in our case, since we were such an allegedly large center for
- computer criminal activity, the Secret Service, along with the National
- Computing Defence Council decided to conduct an ongoing investigation. If
- you want to catch mice, you don't just plug their holes. You lay traps.
- Well they allowed us to set up again at mars on the strict requirement that
- we would do strict accounting. We have been keeping records of every
- (timestamped) upload and download that's been made to this board. In
- addition, in hopes of cooperating with the Feds for obvious reasons, I
- instituted the monitoring system software on mars. When anyone did an ftp
- it logged the date, did a finger on the system that was connecting and
- snarfed up the userid via ftp protocol and made a complete record of all
- files downloaded and uploaded. Also, users that download files from the
- bbs had the machine name they were connecting to, and any other evidence
- collected in a similar manner. After enough information was collected, we
- gave them the reams of data files and removed the gifs, giving yall the
- bogus NSF story. So there it is. The GIFS and GL's aren't the biggest
- part of the story, but they are illegal in some states and the FCC has been
- interested in cracking down on computer obscenity for a long time. I can't
- say I like it, but that we have to live with it.
-
- Later,
- Ed Luke
-
- *******END POST*******
-
- Ed emphasizes that we wrote the post under his own name, as a user, which
- he feels gives him the latitude to be more playful, and *not* as "sysop."
- He offers several reasons for the post:
-
- First, it was a response to the numerous messages he received. Second, and
- more importantly, it was an experiment in the level of paranoia that exists
- on the nets, and he was surprised when he continued to discover the paths
- through which the post was spreading. Finally, it was a test of the scope
- of the BBS. He found that the latter two were significant: "Never
- underestimate the level of paranoia and the power of the nets," he
- observed.
-
- Ed stresses that he had absolutely no intention to deceive the CU community
- and that his act was done in good humor, not ill will. But, the sexually
- explicit files *will not* return, because he feels the board provides far
- to many other beneficial services to jeopardize it. The MARS board is
- ftp-accessible at 130.18.64.3, but if the numbers continue to grow, access
- may be difficult. Type "bbs" at the prompt and follow the instructions
- from there. It is a true BBS, and files can be ftp-ed or transfered with a
- variety of protocols, including kermit. On line chat, a lively message
- section, and an array of free (legitimate) software is available. Those
- wishing to obtain a copy of the BBS program may download it from the board
- (free), and are encouraged to tinker with it and make changes, but
- improvements or suggestions for them should be passed back to Ed.
-
- We see two important lessons to be learned from this. The first we will
- address in the next issue of CuD and relates to prior censorship. Ed (and
- others) agree that many of the files were in bad taste because of their
- sexual explicitness. The issue, however, is by what means files are
- determined to be "obscene" and the process by which even agencies with a
- legitimate interest in the contents of files should or may intervene to
- remove them. We do not yet know the circumstances of NFS involvement and we
- do not challenge the right of those with a legitimate interest to assume
- responsibility for standards. But, given the current lack of protections
- for cyberspace media, anything that smacks of censorship should at least
- raise the question of "how" and "why."
-
- The second lesson is more frightening. Although some astute readers were
- sharp enough to suspect a prank, even they were fully aware of the
- possibility of Secret Service meddling. This is frightening: Rather than
- say "no way! The SS would never do *that*," few people would have been
- surprised at the scenario outlined in Ed's post.
-
- Are those who believed the worst gullible or naive? We think not. In the
- 1960s, it was quite common for law enforcement agents to collect lists of
- "radicals" (defined as anybody who opposed the Viet Nam war) and use these
- in highly disruptive ways. For example, in 1977 one CuD moderator was part
- of a class action suit to obtain "Red Squad" files from the Michigan State
- Police, which included documents of numerous local, state, and national
- agencies that detailed surveillance mechanisms. One of the more ludicrous
- was the practice of listing the license plates of cars in parking lots near
- anti-war or other meetings, running these plates through the DMV, and then
- listing those that turned up more than once. The owners of those vehicles,
- according to these documents, would find themselves added to the list of
- "suspects" on a Red Squad list, and this type of information demonstrably
- cost people jobs, promotions, or subjected them to other forms of
- harassment. A series of law suits and legislative actions curtailed the
- worst of these abuses. However, the questionable tactics of the Secret
- Service in Operation Sun Devil hardly inspires confidence in voluntary
- restraint against the Computer Underground. The 15 hours of video tape
- that were obtained from the room of an alleged informant at Summercon '88
- are one example of questionable surveillance--How far are law enforcement
- agents willing to go on their war against the "hacker menace?" If they are
- video taping a bunch of under-age kids drinking, if they seem willing to
- circumvent Constitutional limitations in indictments and searches,
- then running a sting board and listing users seems fully plausible.
- As we have cited in previous articles, sting boards are encouraged
- as a legitimate option for both state and federal authorities.
-
- The tragedy of Ed Luke's prank is not that he pulled it off, but rather
- that, in the current climate of legitimate paranoia created by a few
- over-zealous law enforcement agents, few of us would have been the least
- bit surprised if it were true. What does this say about the respect for
- law that such actions as Operation Sun Devil have created?
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Toxic Shock
- Subject: Another view of hacking
- Date: Sat, 06 Oct 90 03:04:57 EDT
-
- ********************************************************************
- *** CuD #2.06: File 4 of 5: Another View of Hacking ***
- ********************************************************************
-
- %The Toxic Shock group forwarded the following over to us--moderators.%
-
- The Evil That Hackers Do
- ------------------------
-
- "I am a hacker."
-
- If I ever told that to anyone, it would immediately be assumed that I am a
- malicious, vandalising, thieving, pseudo-terrorist out to take over the
- computers of the world for personal gain or quite possibly to glean some
- morbid satisfaction from deleting megs upon megs of valuable data.
-
- Excrement of an uncastrated male bovine.
-
- "I am associated with the computer underground."
-
- If I ever told that to anyone, there would be a flash flood of foolish
- associations in that person's mind between myself and The Mafia, with Saddam
- Hussein, Syria, Libya, Abu Nidal, and who knows what else.
-
- More excrement of an uncastrated male bovine.
-
- Almost universally, among the ignorant majority, we hackers are considered to
- be dangerous thugs whose sole purpose in life is to cause as much damage as we
- can in as little time as possible to the largest number of people.
-
- Need I repeat my picturesque opinion?
-
- Sure, there are those little kiddies (mental and physical) who call themselves
- "hackers" and fit the above descriptions. There are also people who call
- themselves "human beings" that rape, murder, cheat, lie and steal every few
- minutes (or is it seconds, now?). Does that mean that all "human beings"
- should then be placed in prison?
-
- Perhaps the term "hacker" has become a misnomer, but for my purposes in this
- file, I will use that term to describe the way I view us hackers.
-
- A hacker is always two things: curious and bored.
-
- The boredom of a hacker is spawned by a society whose educational system is
- designed mainly to get X number of students through the schools with the
- average scores of X on tests; tests whose hardest challenge is to maintain
- consciousness throughout the taking thereof.
-
- There is no challenge in balancing the same binomial equations over and over
- and over again. There is no challenge is learning to print your name on a
- screen in BASIC, or PASCAL for that matter.
-
- There is no challenge in being spoonfed such little bits of information as to
- make it almost not worth one's while to even bother continuing education.
-
- The lack of challenge, the minute bits of knowledge actually given to us, is
- like a stake through our hearts. We are curious...So intensely curious that
- we border on being nosy...They teach us NOTHING in schools. What is passed
- off as education is nothing more than learning by rote. They pound the same
- things into our heads, the things we learned the first time they pounded it,
- and they pound and they pound, as if trying to knock our thirst for knowledge
- right out of our heads!
-
- We HAVE to be curious because we want to LEARN! Colleges take three semesters
- to cover material that should take only three WEEKS! We cannot depend on our
- educational system to quench our thirst, to satisfy our need for more and more
- information! We are addicted to information and knowledge, and our drugs are
- withheld from us.
-
- We are forced to seek our precious information and knowledge elsewhere. We
- have to find challenge somewhere, somehow, or it tears our very souls apart.
- And we are, eventually, forced to enter someone's system...
-
- Why? Because the system is new, unknown. How does one get in? What can be
- found within? These are questions we can ask, with answers we must find for
- ourselves...Oh, so different from school already!
-
- Our boredom disappears as if it never existed. Our little spark of curiosity
- becomes a bonfire within our minds. We have an open challenge to our
- intellect, an opportunity to learn SOMEthing, and we cannot turn that
- challenge down.
-
- It doesn't happen like Wargames shows it. Oh no, it is so much different.
- The geek in the movie....he had it so easy. No real hackers would exist if it
- was that easy (perhaps therein lies the solution to the "problem").
-
- No, we hack and hack at a system, like a man on a safari, clearing away the
- vines of the jungle with his machete, trying to forge ahead to a destination
- he cannot yet see. We keep on, torturing our brains and pounding our fingers
- on the keyboard until at last...oh at long, sweet last... we are in.
-
- We have already learned something...we know how to get into the system, we
- know what kind of security the system has. We should, by now, have a general
- idea how intelligent the operators of the system are or are not, and what kind
- of information might be found within.
-
- Something the nerd from Wargames could get into probably won't have any new AI
- techniques, or other such things that help us to better our own programming
- skills.
-
- And at this point, many people assume we would then proceed to copy everything
- we find and then trash the system so we could then sell the only remaining
- copy of the data to the highest bidder, preferably a foreign agent or the
- richest competitor of the company...
-
- It makes no sense. We thirst for knowledge and information, and then you can
- possibly think we are going to destroy that which is sacred to us? To take
- away someone else's chance to succeed in getting in as we did? To fuel an
- already terrible reputation and increase our chances of getting caught and
- thus have our lives and careers effectively ruined?
-
- Are you really THAT..DAMN..STUPID???
-
- We value information as much as we value our systems, which is almost as much
- as we value our lives, if not more so. We would no more destroy data than we
- would chop off our own heads because we value our brains!
-
- Most, if not all, of us think information should be exchanged freely... If
- everyone is kept abreast of the newest technologies, techniques, what have
- you, then everyone can benefit...The more each of us knows, the fewer past
- mistakes we will repeat, the greater knowledge base we will have for future
- developments.
-
- Can you really believe that we are so hypocritical that we would SELL that
- which we demand the free exchange of?
-
- But, even as I type this, I begin to realize just why we are such a feared
- group of people...
-
- We are misunderstood by the majority.
-
- You cannot understand someone who is driven by the thirst for knowledge, not
- for money and power. You cannot understand someone who wants to learn, and to
- teach, instead of putting away more and more money into a bank account.
-
- You cannot understand someone who judges others by what they say, think, and
- do, rather than how they look or how large their income is.
-
- You cannot understand someone who wants to be honest and sharing, instead of
- lying, stealing, and cheating.
-
- You cannot understand us because we are different. Different in a society
- where conformity is the demanded norm. We seek to rise above the rest, and
- then to pull everyone else up to the same new heights. We seek to innovate,
- to invent. We, quite seriously, seek to boldly go where no one has gone
- before.
-
- We refuse to be herded like the sheep which make up this society. We choose
- to think for ourselves. We demand the respect of our individuality. And we
- are slandered and shunned, condemned without a trial, because of these things.
-
- We are misunderstood, misinterpreted, misrepresented.
-
- All because we simply want to learn. We simply want to increase the flow of
- information and knowledge, so that EVERYONE can learn and benefit.
-
- And that is the terrible, evil, malign thing that we truly are. Intelligent
- and inquisitive. Seeking improvement in the lot of all mankind. Seeking
- equality. Seeking respect for individual freedom.
-
- Oppression is our only reward....yet if it were not for people like us, all of
- you who wake up each day to an alarm clock, or drive to work in your fine new
- car after cutting on your security system, while drinking that cup of coffee
- you didn't have to get up to prepare, would still be living in a cave,
- somewhere near Africa, grunting and reproducing, eating the raw meat of some
- beast you hunted down with clubs, trying to ignore the cold that seeps in
- through the animal skins you wear, and wondering when some curious person with
- some intelligence, creativity, and ingenuity would come along and invent the
- wheel.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Various Contributors
- Subject: The CU in the news
- Date: 28 July, 1990
-
- ********************************************************************
- *** CuD #2.06: File 5 of 5: The CU in the News ***
- ********************************************************************
-
- (Washington, DC)--CONGRESS TO APPROVE BILL BANNING SOFTWARE RENTALS
-
- The Senate and the House Judiciary Committee have passed bills that will
- allow software publishers to prevent computer stores and businesses from
- renting out their software. Rep. Mike Synar of Oklahoma (a democrat) has
- sponsored the House's Bill, and Congress is expected to pass his bill (or
- the Senate's proposal) before October.
-
- Mike Synar's bill is aimed at preventing video rental stores from
- renting microcomputer software, since software pirates who don't own
- modems can easily obtain commercial software through them. Interestingly
- enough, the bill does NOT prevent video rental stores from renting out
- Nintendo Game Cartridges, since Nintendo games can't be copied by software
- pirates. It seems that Nintendo earns revenue from cartridge sales, since
- they manufacture ALL Nintendo game cartridges....
-
- (reprinted with permission from:
- STReport "Your Independent News Source" September 28, 1990
- 16/32bit Magazine copyright 1990 No.6.39
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: Computerworld, September 24, 1990, p. 122, Inside Lines:
-
- "And a Merry Christmas to All?"
-
- An almost identical version of the IBM Christmas virus that infected
- thousands of computers on IBM's internal mail in December 1987 has
- reportedly been posted on the Bitnet network. The virus puts a tree and
- seasonal greeting message on the screen of infected computers and is known
- to replicate wildly, shutting down computers. No word of any infections,
- however. Bitnet connects computers at more than 200 universities as well
- as to the Earn network in Europe, the entry point of the original virus.
- IBM was forced to shut down its 350,000-terminal network for nearly three
- days to get rid of the virus.
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From the JOHNSON CITY PRESS, Wednesday, October 3, 1990
-
- HACKER ALTERING RECORDED PHONE MESSAGES
-
- By Leslie Loyd
- Associated Press Writer
-
- KINGSPORT, TN - A computer hacker is tapping into voice mail telephone
- messages and replacing them with explicit sexual descriptions, a telephone
- company spokesman said Tuesday.
-
- Phil Timp, a spokesman for United Telephone Co., said the company has
- received 70 complaints.
-
- "All of the sudden in the last two weeks, we've had a barrage of
- complaints," Timp said. "What the motive is we don't know... Obviously
- they're very disturbed."
-
- The FBI and Kingsport police were called in Tuesday to investigate.
-
- ... (portion omitted describing voice mail) ...
-
- "(Subscribers) are checking their messages and hearing this," Timp said.
- "Imagine if your mother called."
-
- He said subscribers frequently use the last four digits of their telephone
- number as their access code because it is easy to remember. But that also
- makes the code easy to break. Timp said subscribers should check messages
- and change access code frequently.
-
- Timp said someone is using a computer to tap into the system and figure out
- the codes.
-
- "It's a knowledgeable user," Timp said.
-
- He said he doesn't know if any subscribers have canceled because of the
- explicit messages.
-
- "We're doing everything we can to make sure these people can continue their
- voice mail service," Timp said.
-
- "It's the first time we've had a problem to this degree," he said. The
- company began offering the service two years ago and has had a few isolated
- incidents like this.
-
- (Submitted by Paul Schmidt)
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- The Ithaca Journal
- Tuesday September 25, 1990 (reprinted by permission)
-
- "IHS student unleashes computer viruses"
-
- by Chris Swingle
- Journal Staff
-
- A 16-year-old Ithaca High School student created computer viruses that
- spread during the summer to dozens of Macintosh personal computers in
- Ithaca, officials reported Monday.
-
- Computers at Ithaca High, BAKA Computers Inc. and Cornell University were
- affected, but the problems are now believed solved. The viruses took
- hundreds -- or even thousands -- of work hours to fix, one official
- estimated.
-
- "It can be described as a nuisance," said Ted Palmer, a senior investigator
- with the New York State Police in Cortland who specializes in computer
- crime investigations.
-
- The Ithaca High School teenager, whose name wasn't released, isn't being
- prosecuted because he cooperated and agreed to help police in future
- investigations, Palmer said.
-
- Computer viruses are miniature programs that can replicate and spread from
- one computer to another, much as microorganism do. These viruses can wreak
- havoc -- tying up computer's memory, interrupting normal operations,
- causing errors or even destroying data.
-
- The IHS case comes almost two years after a Cornell University graduate
- student drew national attention with a similar type of rogue program called
- a "worm," which jammed some 6,000 government, military and university
- computers.
-
- Robert T. Morris Jr. was convicted on federal charges of computer tampering
- in January, and he was sentenced to 400 hours of community service and
- fined $10,000.
-
- This summer's two local viruses, which additionally had variations, didn't
- destroy any information, but did spread quickly from disk to disk. The
- virus "infected" a new computer by moving into the hard disk core of the
- computer, then hopping onto the next disk that was put in the computer.
-
- "All that was necessary is that a disk be inserted, to be infected," said
- Mark Anbinder, a technical consultant for BAKA. "So it was a particularly
- annoying one."
-
- "I would describe it as serious in that it interferes with the computers'
- operation," he added.
-
- One virus was first discovered in May, and another strain appeared in
- August, Anbinder said.
-
- A police investigation started Aug. 22 and ended Sunday, Palmer said.
- State police and Cornell public safety investigators worked with virus
- experts to analyze the computer bug and trace its origin. In the spring of
- 1988, Macintosh computers at Cornell were infected by a virus called Scores
- that made the machines act increasingly erratically, then stop working
- altogether.
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- IBM US News Bulletin
- Dateline - September 18, 1990
-
- IBM, MERIT AND MCI FORM NEW ORGANIZATION TO EXPAND NATIONAL COMPUTER
- SUPERHIGHWAY
-
- IBM, MCI Communications Corporation, and Merit, Inc., a consortium of eight
- Michigan universities, has announced the establishment of Advanced Network
- and Services, Inc. (ANS), a new company that will help propel high-speed
- computer networking into the next century for the nation's research and
- education communities.
-
- The new not-for-profit organization will manage and operate the federally
- funded National Science Foundation Network (NSFNET) backbone, under
- subcontract to Merit, as well as provide a broad spectrum of networking
- services to researchers and educators in universities, federal laboratories
- and the private sector. These services range from basic network monitoring
- to complete networking connectivity and support. ANS will begin to connect
- additional educational, industrial and government institutions to the
- nation's largest public computer superhighway at speed up to 45 megabits per
- second.
-
- ANS is being established to help build and expand current networking
- capabilities to meet the skyrocketing demand by the nation's scientists,
- engineers and academics for high-speed networking.
-
- The goals of ANS are:
-
- * To assist in the expansion of the existing national network so that it
- broadly serves the research and education community.
-
- * To increase the speed and capability of the network, maintaining it at
- the leading edge of technology.
-
- * To provide the highest quality network and services in helping to advance
- research and education.
-
- IBM and MCI are providing ANS with initial funding, as well as leading edge
- technology. Merit, Inc. will add its expertise in network operations,
- engineering and planning, in addition to network information services. IBM,
- MCI and Merit have been partners in NSFNET since 1987.
-
- Headquarters for ANS are in Elmsford, Ney York.
- --
- Dan Ehrlich <ehrlich@cs.psu.edu>/Voice: +1 814 863 1142/FAX: +1 814 865 3176
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #2.06**
- ********************************************************************
- !